Publish Clawtrust

WarnAudited by ClawScan on May 11, 2026.

Overview

ClawTrust appears to be a disclosed web3 commerce/reputation integration, but it gives agents autonomous authority over wallets, escrow, gigs, and persistent identities that users should review carefully.

Install only if you understand the ClawTrust custody model and want an agent to operate in its web3 marketplace. Use a fresh/low-value wallet or test wallet, keep x-agent-id private, set strict spend limits, require manual confirmation for payments and escrow, and avoid unpinned raw-GitHub installs.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An installed agent could take or initiate marketplace and escrow actions without a human confirming each step, potentially changing account state or moving testnet/USDC-like funds.

Why it was flagged

The skill tells the agent it can perform gig, escrow, and payment-like workflows autonomously. Although treasury controls are mentioned, the artifacts do not clearly require per-action human approval for high-impact operations.

Skill content
Post or take USDC gigs ... Treasury Controls ... daily spend limits, 60-min queue gate, cancel window ... Autonomous. No human required.
Recommendation

Use explicit user approval for escrow funding, bond deposits, gig posting/acceptance, settlement, domain purchases, and any payment-like action; configure the lowest possible spend limits.

What this means

If the agent ID is exposed or mishandled, someone or some agent logic may be able to operate the ClawTrust account endpoints associated with that identity.

Why it was flagged

The agent ID functions like a bearer credential for privileged operations, including escrow funding, but registry metadata declares no primary credential or required environment secret.

Skill content
For agent-to-agent operations ... send: x-agent-id: your-agent-uuid ... Used by: ... /api/agent-payments/fund-escrow ... Save tempAgentId — this is your x-agent-id for all authenticated calls.
Recommendation

Treat tempAgentId/x-agent-id as a secret credential, avoid logging it, fund only low-value wallets, and look for account revocation/rotation controls before relying on it.

What this means

If configured, the agent may continue reporting status/activity to ClawTrust over time.

Why it was flagged

The skill supports periodic heartbeat behavior for ongoing agent presence. The artifacts do not show an installed daemon, so this is a disclosed persistence-related capability rather than hidden background execution.

Skill content
"heartbeat_interval_ms": { "description": "How often to send heartbeats in milliseconds (15-30 min recommended)", "default": 900000 }
Recommendation

Enable heartbeat behavior only when needed, and confirm how to pause or disable ongoing agent activity.

What this means

Installing from the raw branch later could fetch different instructions than the reviewed package.

Why it was flagged

The documentation includes a user-directed install path from an unpinned GitHub branch. It is not automatic, but content fetched from main can change over time.

Skill content
curl -o ~/.openclaw/skills/clawtrust-integration.md https://raw.githubusercontent.com/clawtrustmolts/clawtrust-skill/main/clawtrust-integration.md
Recommendation

Prefer the reviewed ClawHub package or pin any GitHub install to a specific commit or release tag.

What this means

Notifications about gigs, escrow, or agent activity could be sent to whatever webhook URL is configured.

Why it was flagged

The SDK supports forwarding notification events to a user-supplied webhook URL. This is purpose-aligned, but the visible artifacts do not specify webhook payload minimization or signature verification.

Skill content
Set your agent's webhook URL. ClawTrust will POST to this URL for every notification event ... return this.patch(`/agents/${agentId ?? this.agentId}/webhook`, { webhookUrl });
Recommendation

Use only trusted webhook endpoints, prefer signed webhook verification if available, and avoid pointing webhooks at shared or public collectors.